<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE certs types in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3715396#M495089</link>
    <description>&lt;P&gt;Hi guys, for a 5 node distributed deployment, what kind of cert do you recommend. The client doesn’t have a pki infrastructure. Is it ok to use the self signed certs or should I have them purchase a wildcard cert with the nodes fqdns in the SAN field?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 29 Sep 2018 03:09:48 GMT</pubDate>
    <dc:creator>NETAD</dc:creator>
    <dc:date>2018-09-29T03:09:48Z</dc:date>
    <item>
      <title>ISE certs types</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3693438#M495083</link>
      <description>&lt;P&gt;Hello, what kind of cert ls is needed on ISE for the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1-Guest Portal: wildcard publicly signed cert with the wildcard present in the CN and the hostname as one of the SANs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2-EAP-TLS: issued by an internal CA? How should the cert be structured for the client, and server?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3-BYOD: use ISE internal CA feature?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4-Node registration: use self-signed or the same wildcard cert used for the guest portal?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Aug 2018 04:08:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3693438#M495083</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2018-08-23T04:08:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certs types</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3693456#M495084</link>
      <description>&lt;P&gt;For items 1, 2 and 4 you can use the same public CA issued wildcard cert if you want.&amp;nbsp; If you do go this route, ensure that the *.ise.domain.com is in the SAN and not the CN.&amp;nbsp; The CN can be any name you want (ex. it could be CN=ise.domain.com) so long as it is also included as a SAN.&amp;nbsp; It does not need to be a node hostname.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Admin, EAP, and Guest portals will all work fine with the same wildcard certificate so long as you follow the rules above.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;In regards to 3 for BYOD.&amp;nbsp; I have&amp;nbsp;leveraged ISE to provision certs for non corporate devices but I have not used ISE to directly issue these.&amp;nbsp; In past deployments I used ISE to call an internal Microsoft CA via scep then issue the user cert.&amp;nbsp; I've heard from peers that the ISE CA is more than capable of doing the same.&amp;nbsp; Depends what you want/need.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Aug 2018 04:48:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3693456#M495084</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2018-08-23T04:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certs types</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3693839#M495085</link>
      <description>&lt;P&gt;Thanks Damien,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So all the ise nodes hostnames must be one of the SANs, the wildcard must be one of the SANs, and anything in the CN?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what about the client side certs when using eap-tls?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Aug 2018 16:10:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3693839#M495085</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2018-08-23T16:10:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certs types</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3693880#M495086</link>
      <description>&lt;P&gt;Like Damien noted, you just need to make sure the CN includes generic name such as ise.example.com. For the SAN at&amp;nbsp;minimum have ise.example.com (Repeat of what was done for CN) and *.example.com (Wildcard).&lt;/P&gt;
&lt;P&gt;For endpoint certificate, the attibributes are auto populated based on the "Certificate Template" on ISE. You can change it by going to Administration &amp;gt; System &amp;gt; Certificates, then on the left menu Certificate Authority &amp;gt; Certificate Template. The one named 'EAP_Authentication_Certificate_Template' is the default template that is used for the endpoints during the BYOD flow, but you can create a new one as well.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Aug 2018 16:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3693880#M495086</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-08-23T16:59:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certs types</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3693885#M495087</link>
      <description>Thanks. I was inquiring about the corporate endpoints certs structure and issuance.</description>
      <pubDate>Thu, 23 Aug 2018 17:05:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3693885#M495087</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2018-08-23T17:05:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certs types</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3694042#M495088</link>
      <description>&lt;P&gt;Not sure which platform you will be using for corp endpoints, but if it is Windows, then you can use certificate template on Windows CA to dictate how the attributes are populated with auto enrollment. As long as the certificates are mutually valid then ISE can authenticate the endpoint.&amp;nbsp;I recommend using UPN or SPN&amp;nbsp;for the CN field in the template for easy integration with ISE. Here is link to the Windows CA Auto enrollment:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/windows-server/networking/core-network-guide/cncg/server-certs/configure-server-certificate-autoenrollment" target="_blank"&gt;https://docs.microsoft.com/en-us/windows-server/networking/core-network-guide/cncg/server-certs/configure-server-certificate-autoenrollment&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Aug 2018 20:45:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3694042#M495088</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-08-23T20:45:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certs types</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3715396#M495089</link>
      <description>&lt;P&gt;Hi guys, for a 5 node distributed deployment, what kind of cert do you recommend. The client doesn’t have a pki infrastructure. Is it ok to use the self signed certs or should I have them purchase a wildcard cert with the nodes fqdns in the SAN field?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Sep 2018 03:09:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3715396#M495089</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2018-09-29T03:09:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certs types</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3715483#M495090</link>
      <description>Great article&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.networkworld.com/article/2225032/infrastructure-management/what-are-wildcard-certificates-and-how-do-i-use-them-with-ciscos-ise.html" target="_blank"&gt;https://www.networkworld.com/article/2225032/infrastructure-management/what-are-wildcard-certificates-and-how-do-i-use-them-with-ciscos-ise.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Also read admin config guide&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_011011.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_011011.html&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Sat, 29 Sep 2018 11:12:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certs-types/m-p/3715483#M495090</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-09-29T11:12:21Z</dc:date>
    </item>
  </channel>
</rss>

